Changes

612 bytes added ,  06:59, 2 April 2013
no edit summary
Line 75: Line 75:  
::* Crack the storage chips and use something like a proxy to record all the data streams to a prepared storage (or to PC)
 
::* Crack the storage chips and use something like a proxy to record all the data streams to a prepared storage (or to PC)
 
::* Or simply let us wait for some progress?
 
::* Or simply let us wait for some progress?
 +
:::You need to read up on the 3DS file formats, and boot order. It's nowhere near as simple as that.--[[User:3dsguy|3dsguy]] 07:59, 2 April 2013 (CEST)
 +
 
::I hope you can get some inspiration and find a new way. Well i'm wondering about where could be a 'CTR Common Prod 1' key stored. (if that can be written somehow, we may be able to cheat the system (if we can get its private key from device and use that for decrypt, sorry)'''I check those "CTR Common Prod 1" of my Japanese 3ds and one Usa 3ds of my friend, and found there is nothing different in hex.''' if you need more detail about that, pm me.) is that still more important finding the way? --[[User:Syphurith|Syphurith]] 09:50, 28 March 2013 (CET)
 
::I hope you can get some inspiration and find a new way. Well i'm wondering about where could be a 'CTR Common Prod 1' key stored. (if that can be written somehow, we may be able to cheat the system (if we can get its private key from device and use that for decrypt, sorry)'''I check those "CTR Common Prod 1" of my Japanese 3ds and one Usa 3ds of my friend, and found there is nothing different in hex.''' if you need more detail about that, pm me.) is that still more important finding the way? --[[User:Syphurith|Syphurith]] 09:50, 28 March 2013 (CET)
 +
::You won't find the 3DS common key by analysing 3DS communications. The common key(s) are stored in two parts, and scrambled, deep inside the 3DS.--[[User:3dsguy|3dsguy]] 07:59, 2 April 2013 (CEST)
 
:I tried to check the 'exefs.bin' in your archive uploaded, and found it not easy to analyse. There're many things seems to be timestamps (that WinHex told me).. and those text inside are merely readable (but you can get 'NULL' or something else like 'Mem' or 'display'). I tried hard to get some but found that not useful as a clue. Also the header and reserved in exefs are 0x180 length now. If you can get many decrypted exefs.bin please tell me (especially those on a same branch of source code), thx. Well hope you get progress everyday. --[[User:Syphurith|Syphurith]] 07:22, 2 April 2013 (CEST)
 
:I tried to check the 'exefs.bin' in your archive uploaded, and found it not easy to analyse. There're many things seems to be timestamps (that WinHex told me).. and those text inside are merely readable (but you can get 'NULL' or something else like 'Mem' or 'display'). I tried hard to get some but found that not useful as a clue. Also the header and reserved in exefs are 0x180 length now. If you can get many decrypted exefs.bin please tell me (especially those on a same branch of source code), thx. Well hope you get progress everyday. --[[User:Syphurith|Syphurith]] 07:22, 2 April 2013 (CEST)
 +
::That is the decrypted ExeFS, BTW the ExeFS format is already [[ExeFS|reversed]]. You will probably find it hard to make anything out of the code actual game code, as it is a dissected version of an ARM ELF.--[[User:3dsguy|3dsguy]] 07:59, 2 April 2013 (CEST)
839

edits